Clock Recovery System

Size: px
Start display at page:

Download "Clock Recovery System"

Transcription

1 The recovers the service clock using Adaptive Clock Recovery (ACR) and Differential Clock Recovery (DCR). Finding Feature Information, on page 1 Information About Clock Recovery, on page 1 Prerequisites for Clock Recovery, on page 2 Restrictions for Clock Recovery, on page 3 How to Configure ACR and DCR, on page 3 Associated Commands, on page 8 Additional References for Clock Recovery, on page 9 Finding Feature Information Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to An account on Cisco.com is not required. Information About Clock Recovery Adaptive Clock Recovery (ACR) Adaptive Clock Recovery (ACR) is an averaging process that negates the effect of random packet delay variation and captures the average rate of transmission of the original bit stream. ACR recovers the original clock for a synchronous data stream from the actual payload of the data stream. In other words, a synchronous clock is derived from an asynchronous packet stream. ACR is a technique where the clock from the TDM domain is mapped through the packet domain, but is most commonly used for Circuit Emulation (CEM). Effective Cisco IOS XE Everest , ACR is supported on the 8-port T1/E1 interface module. 1

2 Differential Clock Recovery (DCR) Differential Clock Recovery (DCR) Differential Clock Recovery (DCR) is another technique used for Circuit Emulation (CEM) to recover clocks based on the difference between PE clocks. TDM clock frequency are tuned to receive differential timing messages from the sending end to the receiving end. A traceable clock is used at each end, which ensures the recovered clock is not affected by packet transfer. Benefits of Clock Recovery Customer-edge devices (CEs) can have different clock from that of the Provide-edge devices (PEs). Scaling Information IM Card 48-Port T3/E3 CEM Interface Module Pseudowires Supported (Number of Clocks Derived) 1344 Prerequisites for Clock Recovery The clock of interface modules must be used as service clock. 2

3 Restrictions for Clock Recovery CEM must be configured before configuring the global clock recovery. RTP must be enabled for DCR in CEM, as the differential clock information is transferred in the RTP header. Restrictions for Clock Recovery The reference clock source is used and locked to a single clock. The clock ID should be unique for a particular interface module for ACR/DCR configuration. How to Configure ACR and DCR Configuring ACR for T3/E3 Configuring Adaptive Clock Recovery of T3/E3 Interfaces for SAToP Before You Begin The node (router) on which the 48-Port T3/E3 interface module is configured for ACR, must have its own clock derived from BITS/GPS/Stratum clock. The minimum packet size of CEM pseudowires on the network that delivers robust clock recovery is 256 bytes. To configure the clock on T3/E3 interfaces for SAToP in controller mode, use the following commands: enable configure terminal controller t3/e3 0/0/1 cem-group 0 unframed clock source recovered 1 To configure the clock recovery on T3/E3 interfaces in global configuration mode, use the following commands: clock recovered 1 adaptive cem 1 0 Note The clock configuration on controller must be done before configuring the clock recovery on global configuration mode. Verifying Adaptive Clock Recovery Configuration of T3/E3 Interfaces for SAToP Use the show recovered-clock command to verify the adaptive clock recovery of T3/E3 interfaces for SAToP: 3

4 Configuring DCR for T3/E3 Router# show recovered-clock Recovered clock status for subslot 0/ Clock Type Mode CEM Status Frequency Offset(ppb) Circuit-No 0 DS3 ADAPTIVE 0 ACQUIRED n/a 0 (Port) Use the show running-config section command to verify the configuration of adaptive clock of T3/E3 interfaces: Router# show running-config section 0/0/1 controller MediaType 0/0/1 mode t3 controller T3 0/0/1 cem-group 0 unframed clock source recovered 1 cablelength 224 interface CEM0/0/1 no ip address Use the show running-config section recovered-clock command to verify the recovery of adaptive clock of T3/E3 interfaces: Router# show running-config section recovered-clock clock recovered 1 adaptive cem 1 0 Configuring DCR for T3/E3 Configuring Differential Clock Recovery of T3/E3 Interfaces for SAToP Before You Begin Before you start configuring DCR, RTP must be enabled on the CEM interface. The RTP is used to carry the differential time. The minimum packet size of CEM pseudowires on the network that delivers robust clock recovery is 256 bytes. To configure differential clock recovery on T3/E3 interface for SAToP in controller mode, use the following commands: enable configure terminal controller t3/e3 0/0/1 cem-group 0 unframed clock source recovered 1 To configure RTP header under interface, use the following commands: interface /0/1 4

5 Verifying the Differential Clock Recovery Configuration of T3/E3 Interfaces for SAToP rtp-present To configure differential clock recovery of T3/E3 interface in global configuration mode, use the following commands: clock recovered 1 differential cem 1 0 Note The clock configuration on controller must be done before configuring the clock recovery on global configuration mode. Verifying the Differential Clock Recovery Configuration of T3/E3 Interfaces for SAToP Use the show recovered-clock command to verify the differential clock recovery of T3/E3 interfaces for SAToP: Router# show recovered-clock Recovered clock status for subslot 0/ Clock Type Mode CEM Status Frequency Offset(ppb) Circuit-No 0 DS3 DIFFERENTIAL 0 ACQUIRED n/a 0 (Port) Use the show running-config section command to verify the configuration of differential clock of T3/E3 interfaces for SAToP: Router# show running-config section 0/0/1 controller MediaType 0/0/1 mode t3 controller T3 0/0/1 cem-group 0 unframed clock source recovered 1 cablelength 224 interface CEM0/0/1 no ip address rtp-present Use the show running-config section recovered-clock command to verify the recovery of differential clock of T3/E3 interfaces: Router# show running-config section recovered-clock clock recovered 1 differential cem 1 0 5

6 Configuring ACR for Channelized T3/T1 or E3/E1 Configuring ACR for Channelized T3/T1 or E3/E1 Configuring Adaptive Clock Recovery of Channelized T3/T1 or E3/E1 Interfaces for SAToP Before You Begin The node (chassis) on which the T3/T1 or E3/E1 is configured for ACR, has to have its own clock derived from BITS/GPS/Stratum clock. The minimum packet size of CEM pseudowires on the network that delivers robust clock recovery is 256 bytes. To configure adaptive clock on a channelized T3/T1 or E3/E1 interfaces under controller for SAToP in controller mode, use the following commands: enable configure terminal controller t3/e3 0/0/1 t1/e1 1 cem-group 0 unframed t1/e1 1 clock source recovered 1 To configure recovery of adaptive clock of channelized T3/T1 or E3/E1 interfaces in global configuration mode, use the following commands: clock recovered 1 adaptive cem 1 0 Note The clock configuration on controller must be done before configuring the clock recovery on global configuration mode. To remove the clock configuration in ACR and DCR, you must remove the recovery clock configuration in global configuration mode and then remove the controller configuration. Verifying the Adaptive Clock Recovery Configuration of Channelized T3/T1 or E3/E1 Interfaces for SAToP Use the show recovered-clock command to verify the adaptive clock recovery of T3/T1 or E3/E1 interfaces for SAToP: Router# show recovered-clock Recovered clock status for subslot 0/ Clock Type Mode CEM Status Frequency Offset(ppb) Circuit-No 0 DS3-ds1 ADAPTIVE 0 ACQUIRED n/a 0/1 (Port/t1) Use the show running-config section command to verify the configuration of adaptive clock of channelized T3/T1 or E3/E1 interfaces: Router# show running-config section 0/0/1 controller MediaType 0/0/1 6

7 Configuring DCR for Channelized T3/T1 or E3/E1 mode t3 controller T3 0/0/1 framing c-bit cablelength 224 t1 1 cem-group 0 unframed t1 1 clock source recovered 1 interface CEM0/0/1 no ip address Use the show running-config section recovered-clock command to verify the recovery of adaptive clock of channelized T3/T1 or E3/E1 interfaces: Router# show running-config section recovered-clock clock recovered 1 adaptive cem 1 0 Configuring DCR for Channelized T3/T1 or E3/E1 Configuring Differential Clock Recovery of Channelized T3/T1 or E3/E1 Interfaces for SAToP Before You Begin Before you start configuring DCR, RTP must be enabled on the CEM interface. The RTP is used to carry the differential time. The minimum packet size of CEM pseudowires on the network that delivers robust clock recovery is 256 bytes. To configure differential clock on a channelized T3/T1 or E3/E1 interfaces under controller in controller mode, use the following commands: enable configure terminal controller t3/e3 0/0/1 t1/e1 1 cem-group 0 unframed t1/e1 1 clock source recovered 1 To configure RTP header under channelized T3/T1 or E3/E1 interfaces, use the following commands: interface /0/1 rtp-present To configure recovery of differential clock of channelized T3/T1 or E3/E1 interfaces in global configuration mode, use the following commands: clock recovered 1 differential cem 1 0 7

8 Verifying the Differential Clock Recovery Configuration of Channelized T3/T1 or E3/E1 Interfaces for SAToP Note The clock configuration on controller must be done before configuring the clock recovery on global configuration mode. Verifying the Differential Clock Recovery Configuration of Channelized T3/T1 or E3/E1 Interfaces for SAToP Use the show recovered-clock command to verify the differential clock recovery of T3/T1 or E3/E1 interfaces for SAToP: Router# show recovered-clock Recovered clock status for subslot 0/ Clock Type Mode CEM Status Frequency Offset(ppb) Circuit-No 0 DS3-ds1 DIFFERENTIAL 0 ACQUIRED n/a 0/1 (Port/t1) Use the show running-config section command to verify the configuration of differential clock of channelized T3/T1 or E3/E1 interfaces: Router# show running-config section 0/0/1 controller MediaType 0/0/1 mode t3 controller T3 0/0/1 framing c-bit cablelength 224 t1 1 cem-group 0 unframed t1 1 clock source recovered 1 interface CEM0/0/1 no ip address rtp-present Use the show running-config section recovered-clock command to verify the recovery of differential clock of channelized T3/T1 or E3/E1 interfaces: Router# show running-config section recovered-clock clock recovered 1 differential cem 1 0 Associated Commands The commands used to adaptive clock recovery and differential clock recovery on 48-Ports T3/E3 Interface Module. Commands clock recovered adaptive cem URL interface/command/ir-cr-book/ ir-c2.html#wp

9 Additional References for Clock Recovery Commands cem-group recovered-clock controller t3/e3 clock-source URL interface/command/ir-cr-book/ ir-c1.html#wp interface/command/ir-cr-book/ ir-o1.html#wp interface/command/ir-cr-book/ ir-c2.html#wp interface/command/ir-cr-book/ ir-c2.html#wp Additional References for Clock Recovery Related Documents Related Topic Cisco IOS commands Document Title Cisco IOS Master Commands List, All Releases Standards and RFCs Standard/RFC ITU -T G.8261 Title Timing and synchronization aspects in packet networks MIBs MIB MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: 9

10 Additional References for Clock Recovery Technical Assistance Description The Cisco Support website provides extensive online resources, including documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Link 10

Clock Recovery System

Clock Recovery System The recovers the service clock using Adaptive Clock Recovery (ACR) and Differential Clock Recovery (DCR). Finding Feature Information, page 1 Information About Clock Recovery, page 1 Prerequisites for

More information

Clock Recovery System

Clock Recovery System The recovers the service clock using Adaptive Clock Recovery (ACR) and Differential Clock Recovery (DCR). Finding Feature Information, on page 1 Information About Clock Recovery, on page 1 Prerequisites

More information

RADIUS Route Download

RADIUS Route Download The feature allows users to configure their network access server (NAS) to direct RADIUS authorization. Finding Feature Information, page 1 Prerequisites for, page 1 Information About, page 1 How to Configure,

More information

Overview of Circuit Emulation

Overview of Circuit Emulation Circuit Emulation (CEM) is a technology that provides a protocol-independent transport over IP/MPLS networks. It s proprietary or legacy applications to be carried transparently to the destination, similar

More information

Overview of Circuit Emulation

Overview of Circuit Emulation Circuit Emulation (CEM) is a technology that provides a protocol-independent transport over IP/MPLS networks. It s proprietary or legacy applications to be carried transparently to the destination, similar

More information

Configuring Pseudowire

Configuring Pseudowire This chapter provides information about configuring pseudowire features on the Cisco ASR 920 Series Router. Pseudowire Overview, on page 1 CEM Configuration, on page 2 CEM Configuration Guidelines and

More information

Card Protection for 48-Port T1/E1 CEM and 48-Port T3/E3 CEM Interface Modules

Card Protection for 48-Port T1/E1 CEM and 48-Port T3/E3 CEM Interface Modules Card Protection for 48-Port T1/E1 CEM and 48-Port T3/E3 CEM Interface Modules The Card Protection feature is introduced for the 48-Port T1/E1 and 48-port T3/E3 interface modules. In this feature, the interface

More information

Configuring System MTU

Configuring System MTU Restrictions for System MTU, on page 1 Information About the MTU, on page 1 How to Configure MTU, on page 2 Configuration Examples for System MTU, on page 4 Additional References for System MTU, on page

More information

Encrypted Vendor-Specific Attributes

Encrypted Vendor-Specific Attributes The feature provides users with a way to centrally manage filters at a RADIUS server and supports the following types of string vendor-specific attributes (VSAs): Tagged String VSA, on page 2 (similar

More information

AAA Dead-Server Detection

AAA Dead-Server Detection The feature allows you to configure the criteria to be used to mark a RADIUS server as dead. If no criteria are explicitly configured, the criteria are computed dynamically on the basis of the number of

More information

Flow-Based per Port-Channel Load Balancing

Flow-Based per Port-Channel Load Balancing The feature allows different flows of traffic over a Gigabit EtherChannel (GEC) interface to be identified based on the packet header and then mapped to the different member links of the port channel.

More information

Configuring DHCP Option 60 and Option 82 with VPN-ID Support for Transparent Automatic Logon

Configuring DHCP Option 60 and Option 82 with VPN-ID Support for Transparent Automatic Logon Configuring DHCP Option 60 and Option 82 with VPN-ID Support for Transparent Automatic Logon Intelligent Services Gateway (ISG) is a Cisco software feature set that provides a structured framework in which

More information

Configuring the Cisco Discovery Protocol

Configuring the Cisco Discovery Protocol Finding Feature Information, page 1 Information About CDP, page 1 How to Configure CDP, page 3 Monitoring and Maintaining CDP, page 11 Additional References, page 12 Feature History and Information for

More information

Configuring Embedded Resource Manager-MIB

Configuring Embedded Resource Manager-MIB The Embedded Resource Manager (ERM)-MIB feature introduces MIB support for the ERM feature. The ERM feature tracks resource usage information for every registered resource owner and resource user. The

More information

802.1P CoS Bit Set for PPP and PPPoE Control Frames

802.1P CoS Bit Set for PPP and PPPoE Control Frames 802.1P CoS Bit Set for PPP and PPPoE Control The 802.1P CoS Bit Set for PPP and PPPoE Control feature provides the ability to set user priority bits in the IEEE 802.1Q tagged frame to allow traffic prioritization.

More information

Predownloading an Image to Access Points

Predownloading an Image to Access Points Finding Feature Information, page 1 Predownloading an Image to an Access Point, page 1 Restrictions for Predownloading an Image to an Access Point, page 2 How to Predownload an Image to an Access Point,

More information

Dynamic Bandwidth Sharing

Dynamic Bandwidth Sharing The Cisco cbr series router enables dynamic bandwidth sharing (DBS) on integrated cable (IC) and wideband (WB) cable interfaces. Finding Feature Information Your software release may not support all the

More information

NBAR2 HTTP-Based Visibility Dashboard

NBAR2 HTTP-Based Visibility Dashboard The NBAR2 HTTP-based Visibility Dashboard provides a web interface displaying network traffic data and related information. The information is presented in an intuitive, interactive graphical format. Finding

More information

Exclusive Configuration Change Access and Access Session Locking

Exclusive Configuration Change Access and Access Session Locking Exclusive Configuration Change Access and Access Session Locking Exclusive Configuration Change Access (also called the Configuration Lock feature) allows you to have exclusive change access to the Cisco

More information

Contextual Configuration Diff Utility

Contextual Configuration Diff Utility The feature provides the ability to perform a line-by-line comparison of any two configuration files (accessible through the Cisco IOS XE Integrated File System [IFS]) and generate a list of the differences

More information

Configuring System MTU

Configuring System MTU Finding Feature Information, page 1 Restrictions for System MTU, page 1 Information about the MTU, page 2 How to Configure System MTU, page 3 Configuration Examples for System MTU, page 4 Additional References

More information

RADIUS Attribute 66 Tunnel-Client-Endpoint Enhancements

RADIUS Attribute 66 Tunnel-Client-Endpoint Enhancements RADIUS Attribute 66 Tunnel-Client-Endpoint The RADIUS Attribute 66 (Tunnel-Client-Endpoint) feature allows the hostname of the network access server (NAS) to be specified--rather than the IP address of

More information

Configurable Number of Simultaneous Packets per Flow

Configurable Number of Simultaneous Packets per Flow Configurable Number of Simultaneous Packets per Flow In zone-based policy firewalls, the number of simultaneous packets per flow is restricted to 25 and packets that exceed the limit are dropped. The dropping

More information

Autoroute Announce and Forwarding Adjacencies For OSPFv3

Autoroute Announce and Forwarding Adjacencies For OSPFv3 Autoroute Announce and Forwarding The Autoroute Announce and Forwarding Adjacencies for OSPFv3 feature advertises IPv6 routes over MPLS/TE IPv4 tunnels. This module describes how to configure the Autoroute

More information

Configuring Local Authentication and Authorization

Configuring Local Authentication and Authorization Configuring Local Authentication and Authorization Finding Feature Information, page 1 How to Configure Local Authentication and Authorization, page 1 Monitoring Local Authentication and Authorization,

More information

Autoroute Announce and Forwarding Adjacencies For OSPFv3

Autoroute Announce and Forwarding Adjacencies For OSPFv3 Autoroute Announce and Forwarding The Autoroute Announce and Forwarding Adjacencies for OSPFv3 feature advertises IPv6 routes over MPLS/TE IPv4 tunnels. This module describes how to configure the Autoroute

More information

IP Overlapping Address Pools

IP Overlapping Address Pools The feature improves flexibility in assigning IP addresses dynamically. This feature allows you to configure overlapping IP address pool groups to create different address spaces and concurrently use the

More information

Encrypted Vendor-Specific Attributes

Encrypted Vendor-Specific Attributes Encrypted Vendor-Specific Attributes Last Updated: January 15, 2012 The Encrypted Vendor-Specific Attributes feature provides users with a way to centrally manage filters at a RADIUS server and supports

More information

Circuit Emulation over IP

Circuit Emulation over IP (CEoIP) provides a virtual circuit through an IP network--similar to a leased line--to integrate solutions that require a time-sensitive, bit-transparent transport into IP networks. Data, with proprietary

More information

1-Port OC-192 or 8-Port Low Rate CEM Interface Module Configuration Guide, Cisco IOS XE 3S (Cisco ASR 900 Series)

1-Port OC-192 or 8-Port Low Rate CEM Interface Module Configuration Guide, Cisco IOS XE 3S (Cisco ASR 900 Series) 1-Port OC-192 or 8-Port Low Rate CEM Interface Module Configuration Guide, Cisco IOS XE 3S (Cisco ASR 900 Series) First Published: 2016-07-29 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive

More information

Exclusive Configuration Change Access and Access Session Locking

Exclusive Configuration Change Access and Access Session Locking Exclusive Configuration Change Access and Access Session Locking Exclusive Configuration Change Access (also called the Configuration Lock feature) allows you to have exclusive change access to the Cisco

More information

PPPoE Smart Server Selection

PPPoE Smart Server Selection The feature allows service providers to determine which Broadband Remote Access Server (BRAS) a PPP call will terminate on. The feature allows you to configure a specific PPP over Ethernet (PPPoE) Active

More information

Configuring SDM Templates

Configuring SDM Templates Finding Feature Information, on page 1 Information About, on page 1 How to Configure SDM Templates, on page 3 Monitoring and Maintaining SDM Templates, on page 4 Configuration Examples for SDM Templates,

More information

PPPoE Smart Server Selection

PPPoE Smart Server Selection The feature allows service providers to determine which Broadband Remote Access Server (BRAS) a PPP call will terminate on. The feature allows you to configure a specific PPP over Ethernet (PPPoE) Active

More information

Enabling ALGs and AICs in Zone-Based Policy Firewalls

Enabling ALGs and AICs in Zone-Based Policy Firewalls Enabling ALGs and AICs in Zone-Based Policy Firewalls Zone-based policy firewalls support Layer 7 application protocol inspection along with application-level gateways (ALGs) and application inspection

More information

Basic IGMP v3 snooping support (BISS) is supported. Bridge domain (BD) interfaces from 1 to 4094 support IGMP snooping.

Basic IGMP v3 snooping support (BISS) is supported. Bridge domain (BD) interfaces from 1 to 4094 support IGMP snooping. This module describes how to enable and configure the Ethernet Virtual Connection (EVC)-based IGMP Snooping feature both globally and on bridge domains. Finding Feature Information, on page 1 Prerequisites

More information

Multiprotocol Label Switching (MPLS) on Cisco Routers

Multiprotocol Label Switching (MPLS) on Cisco Routers Multiprotocol Label Switching (MPLS) on Cisco Routers This document describes commands for configuring and monitoring Multiprotocol Label Switching (MPLS) functionality on Cisco routers and switches. This

More information

Enabling ALGs and AICs in Zone-Based Policy Firewalls

Enabling ALGs and AICs in Zone-Based Policy Firewalls Enabling ALGs and AICs in Zone-Based Policy Firewalls Zone-based policy firewalls support Layer 7 application protocol inspection along with application-level gateways (ALGs) and application inspection

More information

Configuring the Physical Subscriber Line for RADIUS Access and Accounting

Configuring the Physical Subscriber Line for RADIUS Access and Accounting Configuring the Physical Subscriber Line for RADIUS Access and Accounting Configuring a physical subscriber line for RADIUS Access and Accounting enables an L2TP access concentrator (LAC) and an L2TP network

More information

Password Strength and Management for Common Criteria

Password Strength and Management for Common Criteria Password Strength and Management for Common Criteria The Password Strength and Management for Common Criteria feature is used to specify password policies and security mechanisms for storing, retrieving,

More information

Synchronous Ethernet (SyncE) ESMC and SSM

Synchronous Ethernet (SyncE) ESMC and SSM This module describes Synchronization Status Message (SSM), Ethernet Synchronization Message Channel (ESMC), and generating the Simple Network Management Protocol (SNMP) traps on the SyncE feature. With

More information

Restrictions for DMVPN Dynamic Tunnels Between Spokes. Behind a NAT Device. Finding Feature Information

Restrictions for DMVPN Dynamic Tunnels Between Spokes. Behind a NAT Device. Finding Feature Information DMVPN Dynamic Tunnels Between Spokes Behind a NAT Device The DMVPN: Dynamic Tunnels Between Spokes Behind a NAT Device feature allows Next Hop Resolution Protocol (NHRP) spoke-to-spoke tunnels to be built

More information

8K GM Scale Improvement

8K GM Scale Improvement The feature supports optimization of the Cooperative Protocol (COOP) announcement messages by increasing the number of Group Members (GM) to 8000. Finding Feature Information, page 1 Prerequisites for,

More information

Configuring EEE. Finding Feature Information. Restrictions for EEE

Configuring EEE. Finding Feature Information. Restrictions for EEE Finding Feature Information, page 1 Restrictions for EEE, page 1 Information About EEE, page 2 How to Configure EEE, page 2 Monitoring EEE, page 3 Configuration Examples for, page 4 Additional References,

More information

Circuit Emulation Lab for TDM to IP Migration

Circuit Emulation Lab for TDM to IP Migration Circuit Emulation Lab for TDM to IP Migration LTRSPG-2716 Speakers: Vincent Ng, Sartaj Khuroo Learning Objectives Upon completion of this lab, you will be able to: 1. MPLS Flex-LSP Provisioning 2. Basic

More information

QoS Tunnel Marking for GRE Tunnels

QoS Tunnel Marking for GRE Tunnels The feature introduces the capability to define and control the quality of service (QoS) for both incoming and outgoing customer traffic on the provider edge (PE) router in a service provider network.

More information

Configuring Aggressive Load Balancing

Configuring Aggressive Load Balancing Finding Feature Information, on page 1 Restrictions for Aggressive Load Balancing, on page 1 Information for Parameters, on page 2 How to Configure Aggressive Load Balancing, on page 3 Monitoring Aggressive

More information

Configuring DNS. Finding Feature Information. Prerequisites for Configuring DNS

Configuring DNS. Finding Feature Information. Prerequisites for Configuring DNS The Domain Name System (DNS) is a distributed database in which you can map host names to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated host name.

More information

Using Flexible NetFlow Flow Sampling

Using Flexible NetFlow Flow Sampling This document contains information about and instructions for configuring sampling to reduce the CPU overhead of analyzing traffic with Flexible NetFlow. NetFlow is a Cisco technology that provides statistics

More information

Configuring Switched Port Analyzer

Configuring Switched Port Analyzer This document describes how to configure local Switched Port Analyzer (SPAN) and remote SPAN (RSPAN) on the router. Finding Feature Information, page 1 Prerequisites for Configuring Local Span and RSPAN,

More information

FPG Endpoint Agnostic Port Allocation

FPG Endpoint Agnostic Port Allocation When the Endpoint Agnostic Port Allocation feature is configured, an entry is added to the Symmetric Port Database. If the entry is already available, the port listed in the Symmetric Port Database is

More information

Using Flexible NetFlow Flow Sampling

Using Flexible NetFlow Flow Sampling This document contains information about and instructions for configuring sampling to reduce the CPU overhead of analyzing traffic with Flexible NetFlow. NetFlow is a Cisco technology that provides statistics

More information

Configuring Secure Shell (SSH)

Configuring Secure Shell (SSH) Finding Feature Information, page 1 Prerequisites for Configuring the Switch for Secure Shell (SSH) and Secure Copy Protocol (SCP), page 1 Restrictions for Configuring the ControllerDevice for SSH, page

More information

Configuring EEE. Finding Feature Information. Information About EEE. EEE Overview

Configuring EEE. Finding Feature Information. Information About EEE. EEE Overview Finding Feature Information, page 1 Information About EEE, page 1 Restrictions for EEE, page 2 How to Configure EEE, page 2 Monitoring EEE, page 3 Configuration Examples for, page 4 Additional References,

More information

Configuring Access Point Groups

Configuring Access Point Groups Finding Feature Information, page 1 Prerequisites for Configuring AP Groups, page 1 Restrictions for, page 2 Information About Access Point Groups, page 2 How to Configure Access Point Groups, page 4 Additional

More information

Configuring Access Point Groups

Configuring Access Point Groups Finding Feature Information, page 1 Prerequisites for Configuring AP Groups, page 1 Restrictions for, page 2 Information About Access Point Groups, page 2 How to Configure Access Point Groups, page 3 Additional

More information

PPPoE Agent Remote-ID and DSL Line Characteristics Enhancement

PPPoE Agent Remote-ID and DSL Line Characteristics Enhancement PPPoE Agent Remote-ID and DSL Line Characteristics Enhancement The PPPoE Agent Remote-ID and DSL Line Characteristics Enhancement feature provides a method by which the digital subscriber line access multiplexer

More information

Configuring Secure Shell (SSH)

Configuring Secure Shell (SSH) Finding Feature Information, on page 1 Prerequisites for Configuring Secure Shell, on page 1 Restrictions for Configuring Secure Shell, on page 2 Information About Configuring Secure Shell, on page 2 How

More information

Configuring Frequency Synchronization

Configuring Frequency Synchronization Frequency Synchronization is used to distribute precision frequency around a network. This module describes the tasks required to configure frequency synchronization on the Cisco IOS XR software. For more

More information

BGP AS-Override Split-Horizon

BGP AS-Override Split-Horizon The feature enables a Provider Edge (PE) device using split-horizon to avoid advertisement of routes propagated by a Customer Edge (CE) device to the same CE device. The BGP AS-Override Split-Horizon feature

More information

Each port on Compact-SFP (CSFP) acts as Tx/Rx and connects to GLC-BX-U using single strand fiber. GLC-2BX-D CSFP must be connected only to GLC-BX-U.

Each port on Compact-SFP (CSFP) acts as Tx/Rx and connects to GLC-BX-U using single strand fiber. GLC-2BX-D CSFP must be connected only to GLC-BX-U. Configuring 1-port 10 Gigabit Ethernet (1 X SFP+) / 1-port Gigabit Ethernet (1 X SFP) / 2-port Gigabit Ethernet (1 X CSFP) and 16-port Gigabit Ethernet (8 X CSFP) / 8-port Gigabit Ethernet (8 X SFP) The

More information

Configuring ISG Policies for Automatic Subscriber Logon

Configuring ISG Policies for Automatic Subscriber Logon Configuring ISG Policies for Automatic Subscriber Logon Intelligent Services Gateway (ISG) is a software feature set that provides a structured framework in which edge devices can deliver flexible and

More information

The MSCHAP Version 2 feature (introduced in Cisco IOS Release 12.2(2)XB5) allows Cisco routers to

The MSCHAP Version 2 feature (introduced in Cisco IOS Release 12.2(2)XB5) allows Cisco routers to The feature (introduced in Cisco IOS Release 12.2(2)XB5) allows Cisco routers to utilize Microsoft Challenge Handshake Authentication Protocol Version 2 (MSCHAP V2) authentication for PPP connections between

More information

Configuring Secure Shell (SSH)

Configuring Secure Shell (SSH) Finding Feature Information, page 1 Prerequisites for Configuring Secure Shell, page 1 Restrictions for Configuring Secure Shell, page 2 Information about SSH, page 3 How to Configure SSH, page 5 Monitoring

More information

IPv6 Access Control Lists

IPv6 Access Control Lists Access lists determine what traffic is blocked and what traffic is forwarded at device interfaces and allow filtering of traffic based on source and destination addresses, and inbound and outbound traffic

More information

Configuring Auto-QoS

Configuring Auto-QoS Finding Feature Information, page 1 Prerequisites for Auto-QoS, page 1 Restrictions for Auto-QoS, page 2 Information About, page 3 How to Configure Auto-QoS, page 6 Monitoring Auto-QoS, page 9 Configuration

More information

Configuring Secure Shell (SSH)

Configuring Secure Shell (SSH) Finding Feature Information, page 1 Prerequisites for Configuring the Switch for Secure Shell (SSH) and Secure Copy Protocol (SCP), page 1 Restrictions for Configuring the Switch for SSH, page 2 Information

More information

Configuring Secure Shell (SSH)

Configuring Secure Shell (SSH) Starting with Cisco IOS XE Denali 16.3.1, Secure Shell Version 1 (SSHv1) is deprecated. Finding Feature Information, on page 1 Prerequisites for Configuring Secure Shell, on page 1 Restrictions for Configuring

More information

SSH Algorithms for Common Criteria Certification

SSH Algorithms for Common Criteria Certification The feature provides the list and order of the algorithms that are allowed for Common Criteria Certification. This module describes how to configure the encryption, Message Authentication Code (MAC), and

More information

Memory Threshold Notifications

Memory Threshold Notifications The feature allows you to reserve memory for critical notifications and to configure a router to issue notifications when available memory falls below a specified threshold. Finding Feature Information,

More information

Flow-Based per Port-Channel Load Balancing

Flow-Based per Port-Channel Load Balancing Flow-Based per Load Balancing The Flow-Based per Load Balancing feature allows different flows of traffic over a Ten Gigabit EtherChannel (GEC) interface to be identified based on the packet header and

More information

Logging to Local Nonvolatile Storage (ATA Disk)

Logging to Local Nonvolatile Storage (ATA Disk) Logging to Local Nonvolatile Storage (ATA Last Updated: October 12, 2011 The Logging to Local Nonvolatile Storage (ATA feature enables system logging messages to be saved on an advanced technology attachment

More information

Configuring SDM Templates

Configuring SDM Templates Information About, on page 1 How to Configure SDM Templates, on page 2 Monitoring and Maintaining SDM Templates, on page 3 Configuration Examples for SDM Templates, on page 4 Additional References for

More information

DHCP Server RADIUS Proxy

DHCP Server RADIUS Proxy The Dynamic Host Configuration Protocol (DHCP) Server RADIUS Proxy is a RADIUS-based address assignment mechanism in which a DHCP server authorizes remote clients and allocates addresses based on replies

More information

Multicast Subsecond Convergence

Multicast Subsecond Convergence Multicast Subsecond Convergence Last Updated: January 11, 2012 The Multicast Subsecond Convergence feature comprises a comprehensive set of features and protocol enhancements that provide for improved

More information

Object Tracking: IPv6 Route Tracking

Object Tracking: IPv6 Route Tracking The feature expands the Enhanced Object Tracking (EOT) functionality to allow the tracking of IPv6 routes. Finding Feature Information, page 1 Restrictions for, page 1 Information About, page 2 How to

More information

Per-Flow Admission. Finding Feature Information. Prerequisites for Per-Flow Admission

Per-Flow Admission. Finding Feature Information. Prerequisites for Per-Flow Admission The feature provides explicit controls to limit packet flow into a WAN edge in order to protect already admitted flows on the routing/wan edge. Finding Feature Information, page 1 Prerequisites for, page

More information

WRED Explicit Congestion Notification

WRED Explicit Congestion Notification Finding Feature Information, page 1 Prerequisites for WRED-Explicit Congestion Notification, page 1 Information About WRED-Explicit Congestion Notification, page 2 How to Configure WRED-Explicit Congestion

More information

Configuring VLAN Trunks

Configuring VLAN Trunks Finding Feature Information, page 1 Prerequisites for VLAN Trunks, page 1 Information About VLAN Trunks, page 2 How to Configure VLAN Trunks, page 5 Configuration Examples for VLAN Trunking, page 20 Where

More information

Configuring Ethernet Management Port

Configuring Ethernet Management Port Prerequisites for Ethernet Management Ports, page 1 Information About the Ethernet Management Port, page 1 How to Configure the Ethernet Management Port, page 4 Example for Configuring IP Address on Ethernet

More information

IPsec NAT Transparency

IPsec NAT Transparency The feature introduces support for IP Security (IPsec) traffic to travel through Network Address Translation (NAT) or Port Address Translation (PAT) points in the network by addressing many known incompatibilities

More information

Configuring Administrator Usernames and Passwords

Configuring Administrator Usernames and Passwords Configuring Administrator Usernames and Passwords Finding Feature Information, on page 1 Information About, on page 1, on page 2 Examples: Administrator Usernames and Passwords Configuration, on page 4

More information

AToM Graceful Restart

AToM Graceful Restart AToM Graceful Restart Last Updated: November 29, 2011 The AToM Graceful Restart feature assists neighboring routers that have nonstop forwarding (NSF), stateful switchover (SSO) and graceful restart (GR)

More information

QoS: Child Service Policy for Priority Class

QoS: Child Service Policy for Priority Class QoS: Child Service Policy for Priority Class First Published: November, 2006 Last Updated: March 2, 2009 The QoS: Child Service Policy for Priority Class feature allows you to configure a child service

More information

BGP Monitoring Protocol

BGP Monitoring Protocol The (BMP) feature supports the following functionality to monitor Border Gateway Protocol (BGP) neighbors, also called BMP clients: Configure devices to function as BMP servers, and set up parameters on

More information

Configuring ATM SNMP Trap and OAM Enhancements

Configuring ATM SNMP Trap and OAM Enhancements Configuring ATM SNMP Trap and OAM Enhancements The ATM SNMP Trap and OAM Enhancements feature provides the ability to send Simple Network Management Protocol (SNMP) notifications for ATM permanent virtual

More information

Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+)

Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+) Finding Feature Information, page 1 Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), page 1 Information About TACACS+, page 3 How to Configure

More information

OSPF Incremental SPF

OSPF Incremental SPF The Open Shortest Path First (OSPF) protocol can be configured to use an incremental SPF algorithm for calculating the shortest path first routes. Incremental SPF is more efficient than the full SPF algorithm,

More information

Contextual Configuration Diff Utility

Contextual Configuration Diff Utility Contextual Configuration Diff Utility Last Updated: November 29, 2011 The Contextual Configuration Diff Utility feature provides the ability to perform a line-by-line comparison of any two configuration

More information

To use DNS, you must have a DNS name server on your network.

To use DNS, you must have a DNS name server on your network. Configuring DNS Last Updated: December 15, 2011 The Domain Name System (DNS) is a distributed database in which you can map host names to IP addresses through the DNS protocol from a DNS server. Each unique

More information

Configuring TCP Header Compression

Configuring TCP Header Compression Header compression is a mechanism that compresses the IP header in a packet before the packet is transmitted. Header compression reduces network overhead and speeds up the transmission of either Real-Time

More information

Cisco Discovery Protocol Version 2

Cisco Discovery Protocol Version 2 Cisco Discovery Protocol (formerly known as CDP) is a Layer 2, media-independent, and network-independent protocol that runs on Cisco devices and enables networking applications to learn about directly

More information

Configuring Online Diagnostics

Configuring Online Diagnostics Finding Feature Information, page 1 Information About, page 1 How to Configure Online Diagnostics, page 2 Monitoring and Maintaining Online Diagnostics, page 6 Configuration Examples for Online Diagnostic

More information

Configuring Secure Shell (SSH)

Configuring Secure Shell (SSH) Finding Feature Information, page 1 Prerequisites for Configuring Secure Shell, page 1 Restrictions for Configuring Secure Shell, page 2 Information about SSH, page 2 How to Configure SSH, page 5 Monitoring

More information

RADIUS Tunnel Attribute Extensions

RADIUS Tunnel Attribute Extensions The feature allows a name to be specified (other than the default) for the tunnel initiator and the tunnel terminator in order to establish a higher level of security when setting up VPN tunneling. Finding

More information

Configuring SDH on 1-Port OC192/STM-64 or 8-Port OC3/12/48/STM-1/-4/-16 Module

Configuring SDH on 1-Port OC192/STM-64 or 8-Port OC3/12/48/STM-1/-4/-16 Module Configuring SDH on 1-Port OC192/STM-64 or 8-Port OC3/12/48/STM-1/-4/-16 Module SDH is a standard that defines optical signals as well as a synchronous frame structure for multiplexed digital traffic. It

More information

PPPoE on ATM. Finding Feature Information. Prerequisites for PPPoE on ATM. Restrictions for PPPoE on ATM

PPPoE on ATM. Finding Feature Information. Prerequisites for PPPoE on ATM. Restrictions for PPPoE on ATM This feature module describes the PPP over Ethernet (PPPoE) on ATM feature. The feature provides the ability to connect a network of hosts over a simple bridging-access device to a remote access concentrator.

More information

SIP ALG Resilience to DoS Attacks

SIP ALG Resilience to DoS Attacks The feature provides protection against Session Initiation Protocol (SIP) application layer gateway (ALG) denial of service (DoS) attacks. This feature supports a configurable lock limit, a dynamic blacklist,

More information

Transferring Files Using HTTP or HTTPS

Transferring Files Using HTTP or HTTPS Cisco IOS Release 12.4 provides the ability to transfer files between your Cisco IOS software-based device and a remote HTTP server using the HTTP or HTTP Secure (HTTPS) protocol. HTTP and HTTPS can now

More information

Configuring SDM Templates

Configuring SDM Templates Finding Feature Information, page 1 Information About, page 1 How to Configure SDM Templates, page 4 Configuration Examples for SDM Templates, page 5 Additional References for SDM Templates, page 7 Feature

More information